Malware Analysis Report

2025-04-14 08:22

Sample ID 250326-vvdhnay1fx
Target 8db1ee6decca485e9542f856906003d946b6244fb0bc44aa1a67528f65264fbe.zip
SHA256 8db1ee6decca485e9542f856906003d946b6244fb0bc44aa1a67528f65264fbe
Tags
wshrat evasion execution persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8db1ee6decca485e9542f856906003d946b6244fb0bc44aa1a67528f65264fbe

Threat Level: Known bad

The file 8db1ee6decca485e9542f856906003d946b6244fb0bc44aa1a67528f65264fbe.zip was found to be: Known bad.

Malicious Activity Summary

wshrat evasion execution persistence trojan

WSHRAT

Wshrat family

Modifies Windows Defender DisableAntiSpyware settings

WSHRAT payload

Blocklisted process makes network request

Drops startup file

Checks computer location settings

Looks up external IP address via web service

Adds Run key to start application

Command and Scripting Interpreter: JavaScript

Enumerates physical storage devices

Runs .reg file with regedit

Suspicious use of WriteProcessMemory

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-03-26 17:18

Signatures

WSHRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Wshrat family

wshrat

Analysis: behavioral1

Detonation Overview

Submitted

2025-03-26 17:18

Reported

2025-03-26 17:20

Platform

win7-20240903-en

Max time kernel

135s

Max time network

145s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js

Signatures

Modifies Windows Defender DisableAntiSpyware settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" C:\Windows\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" C:\Windows\regedit.exe N/A

WSHRAT

trojan wshrat

WSHRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Wshrat family

wshrat

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js C:\Windows\System32\wscript.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js C:\Windows\System32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js\"" C:\Windows\System32\wscript.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js\"" C:\Windows\System32\wscript.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Command and Scripting Interpreter: JavaScript

execution

Enumerates physical storage devices

Runs .reg file with regedit

Description Indicator Process Target
N/A N/A C:\Windows\regedit.exe N/A
N/A N/A C:\Windows\regedit.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2552 wrote to memory of 2524 N/A C:\Windows\system32\wscript.exe C:\Windows\regedit.exe
PID 2552 wrote to memory of 2524 N/A C:\Windows\system32\wscript.exe C:\Windows\regedit.exe
PID 2552 wrote to memory of 2524 N/A C:\Windows\system32\wscript.exe C:\Windows\regedit.exe
PID 2552 wrote to memory of 2320 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\wscript.exe
PID 2552 wrote to memory of 2320 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\wscript.exe
PID 2552 wrote to memory of 2320 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\wscript.exe
PID 2320 wrote to memory of 2932 N/A C:\Windows\System32\wscript.exe C:\Windows\regedit.exe
PID 2320 wrote to memory of 2932 N/A C:\Windows\System32\wscript.exe C:\Windows\regedit.exe
PID 2320 wrote to memory of 2932 N/A C:\Windows\System32\wscript.exe C:\Windows\regedit.exe

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js

C:\Windows\regedit.exe

"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"

C:\Windows\System32\wscript.exe

"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js" /elevated

C:\Windows\regedit.exe

"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 matarife.duckdns.org udp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp

Files

memory/2524-2-0x0000000000160000-0x0000000000161000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg

MD5 0e5411d7ecba9a435afda71c6c39d8fd
SHA1 2d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256 cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512 903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1

memory/2524-4-0x0000000000160000-0x0000000000161000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js

MD5 8040208fce8d913e8bfd30d079ff289b
SHA1 ef7a86909f86a1256d4dca3ae06f025eede7af5d
SHA256 7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68
SHA512 9009bac53eeb69271a232a2d5a7b8e941ac1baf3fd46f4aa186e674d0af471725c1ac9898def16e5caa3e37e8bcbe01369dd51e026d617c7f63b6243a7d96cc8

Analysis: behavioral2

Detonation Overview

Submitted

2025-03-26 17:18

Reported

2025-03-26 17:20

Platform

win10v2004-20250314-en

Max time kernel

130s

Max time network

146s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js

Signatures

Modifies Windows Defender DisableAntiSpyware settings

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" C:\Windows\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" C:\Windows\regedit.exe N/A

WSHRAT

trojan wshrat

WSHRAT payload

Description Indicator Process Target
N/A N/A N/A N/A

Wshrat family

wshrat

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A
N/A N/A C:\Windows\System32\wscript.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation C:\Windows\system32\wscript.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation C:\Windows\System32\wscript.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js C:\Windows\System32\wscript.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js C:\Windows\System32\wscript.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js\"" C:\Windows\System32\wscript.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Local\\Temp\\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js\"" C:\Windows\System32\wscript.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Command and Scripting Interpreter: JavaScript

execution

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings C:\Windows\System32\wscript.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings C:\Windows\system32\wscript.exe N/A

Runs .reg file with regedit

Description Indicator Process Target
N/A N/A C:\Windows\regedit.exe N/A
N/A N/A C:\Windows\regedit.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1096 wrote to memory of 1828 N/A C:\Windows\system32\wscript.exe C:\Windows\regedit.exe
PID 1096 wrote to memory of 1828 N/A C:\Windows\system32\wscript.exe C:\Windows\regedit.exe
PID 1096 wrote to memory of 4824 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\wscript.exe
PID 1096 wrote to memory of 4824 N/A C:\Windows\system32\wscript.exe C:\Windows\System32\wscript.exe
PID 4824 wrote to memory of 4040 N/A C:\Windows\System32\wscript.exe C:\Windows\regedit.exe
PID 4824 wrote to memory of 4040 N/A C:\Windows\System32\wscript.exe C:\Windows\regedit.exe

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js

C:\Windows\regedit.exe

"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"

C:\Windows\System32\wscript.exe

"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js" /elevated

C:\Windows\regedit.exe

"regedit.exe" "C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 matarife.duckdns.org udp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp
US 45.133.180.154:1928 matarife.duckdns.org tcp

Files

C:\Users\Admin\AppData\Local\Temp\ebgeaegdbdecaedfebace.reg

MD5 0e5411d7ecba9a435afda71c6c39d8fd
SHA1 2d6812052bf7be1b5e213e1d813ae39faa07284c
SHA256 cb68d50df5817e51ec5b2f72893dc4c749bf3504519107e0a78dda84d55f09e2
SHA512 903ac6e5c8a12607af267b54bcbbedfa5542c5b4f7ea289ab7c6a32a424d5b846ae406d830cb4ad48e2b46f92c504163c0856af8c3e09685a8855f39f616ddb1

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68.js

MD5 8040208fce8d913e8bfd30d079ff289b
SHA1 ef7a86909f86a1256d4dca3ae06f025eede7af5d
SHA256 7fbe90daab199a8095505ce3b7e9e13a23b638e84378bf5809e84fc91ee92a68
SHA512 9009bac53eeb69271a232a2d5a7b8e941ac1baf3fd46f4aa186e674d0af471725c1ac9898def16e5caa3e37e8bcbe01369dd51e026d617c7f63b6243a7d96cc8